WO2002054664A3 - R-conversion encryption method and system - Google Patents

R-conversion encryption method and system Download PDF

Info

Publication number
WO2002054664A3
WO2002054664A3 PCT/US2002/000640 US0200640W WO02054664A3 WO 2002054664 A3 WO2002054664 A3 WO 2002054664A3 US 0200640 W US0200640 W US 0200640W WO 02054664 A3 WO02054664 A3 WO 02054664A3
Authority
WO
WIPO (PCT)
Prior art keywords
image
encryption method
converted
sequence
binary sequence
Prior art date
Application number
PCT/US2002/000640
Other languages
French (fr)
Other versions
WO2002054664A2 (en
Inventor
Arif Askerov
Telman Askerov
Sergey Lebedev
Original Assignee
Datri Theodore
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Datri Theodore filed Critical Datri Theodore
Publication of WO2002054664A2 publication Critical patent/WO2002054664A2/en
Publication of WO2002054664A3 publication Critical patent/WO2002054664A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3

Abstract

Encryption method and system for iteratively, structurally converting a binary sequence into an encrypted final image. A selected transformation algorithm and an alphabet formed from the binary sequence to be converted is applied to an image of the sequence, and a resulting image is coded with an external key. Additional embodiments code portions of the image with extracted, and optionally scrambled, internal identifiers derived stochastically from the image being converted.
PCT/US2002/000640 2001-01-08 2002-01-08 R-conversion encryption method and system WO2002054664A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP09/756,456 2001-01-08
US09/756,456 US20020136400A1 (en) 2001-01-08 2001-01-08 R-conversion encryption method and system

Publications (2)

Publication Number Publication Date
WO2002054664A2 WO2002054664A2 (en) 2002-07-11
WO2002054664A3 true WO2002054664A3 (en) 2003-03-20

Family

ID=25043567

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2002/000640 WO2002054664A2 (en) 2001-01-08 2002-01-08 R-conversion encryption method and system

Country Status (2)

Country Link
US (1) US20020136400A1 (en)
WO (1) WO2002054664A2 (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020095604A1 (en) * 2001-01-18 2002-07-18 Hausler Jean-Philippe D. Encryption system and method
AU2002301752B2 (en) * 2001-11-28 2004-02-12 Canon Kabushiki Kaisha Encrypting a Coded Representation of an Image to Prevent Unauthorised Access
JP2003302899A (en) * 2002-04-11 2003-10-24 Sony Corp Method and apparatus for encryption and decryption messages based on boolean matrix
AU2008297726B2 (en) * 2007-09-14 2012-11-22 Samsung Electronics Co., Ltd. Apparatus and method for changing subscription status of service in mobile communication system and mobile communication system thereof
WO2010089673A2 (en) * 2009-02-06 2010-08-12 Mikoh Corporation A data authentication technology
JP5539024B2 (en) * 2010-05-27 2014-07-02 キヤノン株式会社 Data encryption apparatus and control method thereof
CN102833448B (en) * 2012-07-28 2015-04-29 辽宁大学 Image scrambling method based on linear chain table
DE112012006844T5 (en) * 2012-08-24 2015-05-07 Motorola Solutions, Inc. Method and device for the authentication of digital information
US9684580B2 (en) * 2013-11-05 2017-06-20 Ixia Methods, systems, and computer readable media for efficient scrambling of data for line rate transmission in high speed communications networks
US10171119B2 (en) 2014-07-29 2019-01-01 Ramot At Tel Aviv University Communication terminals and a method for exchanging information between communication terminals in a noisy environment
CN107609621B (en) * 2017-08-21 2020-04-10 哈尔滨工业大学深圳研究生院 Dot matrix anti-counterfeiting code design method based on chaotic encryption and application system thereof
CN108777611B (en) * 2018-05-11 2021-06-18 吉林大学 Bidirectional linked list sequential encryption and decryption method based on double-key stream cipher

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0676876A1 (en) * 1994-04-05 1995-10-11 International Business Machines Corporation Encryption method and system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0118995A1 (en) * 1983-02-22 1984-09-19 BRITISH TELECOMMUNICATIONS public limited company Generation of identification keys
US5365589A (en) * 1992-02-07 1994-11-15 Gutowitz Howard A Method and apparatus for encryption, decryption and authentication using dynamical systems
US5757913A (en) * 1993-04-23 1998-05-26 International Business Machines Corporation Method and apparatus for data authentication in a data communication environment
IL114361A (en) * 1995-06-27 1998-08-16 Veritas Technology Solutions L File encryption method
FR2751817B1 (en) * 1996-07-29 1998-09-11 Thomson Multimedia Sa CONDITIONAL ACCESS SYSTEM USING MULTIPLE ENCRYPTION KEY MESSAGES
US5872846A (en) * 1996-11-07 1999-02-16 Mci Communications Corporation System and method for providing security in data communication systems
WO1998047259A2 (en) * 1997-03-10 1998-10-22 Fielder Guy L File encryption method and system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0676876A1 (en) * 1994-04-05 1995-10-11 International Business Machines Corporation Encryption method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
MENEZES, OORSCHOT, VANSTONE: "HANDBOOK OF APPLIED CRYPTOGRAPHY, PASSAGE", HANDBOOK OF APPLIED CRYPTOGRAPHY, CRC PRESS SERIES ON DISCRETE MATHEMATICES AND ITS APPLICATIONS, BOCA RATON, FL, CRC PRESS, US, 1997, pages 6 - 20, XP002223772, ISBN: 0-8493-8523-7 *

Also Published As

Publication number Publication date
WO2002054664A2 (en) 2002-07-11
US20020136400A1 (en) 2002-09-26

Similar Documents

Publication Publication Date Title
WO2002054664A3 (en) R-conversion encryption method and system
WO2003041324A3 (en) Biometrics template
MY152592A (en) Authentication of data transmitted in a digital transmission system
EP1107504A3 (en) Method of updating encryption keys in a data communication system
WO1996005702A3 (en) Method and apparatus for authentication in a communication system
WO2008072080A3 (en) Physimetric authentication of physical object by digital identification (did)
WO2004036864A3 (en) Lightweight extensible authentication protocol password preprocessing
MY129580A (en) Method for securing digital information and system therefor
AUPS217002A0 (en) Clarence tan
WO2004002057A3 (en) Round key generation for aes rijndael block cipher
CN110022314B (en) Big data secure transmission method based on matrix two-dimensional code
WO2004114075A3 (en) Method, system, and apparatus for identification number authentication
AU3962701A (en) Key and lock device
WO2001046782A3 (en) Method of pre-releasing encrypted digital data
CN109600620B (en) Video file protection method
CN108322750B (en) Encrypted domain HEVC video data hiding method based on residual coefficient modulation
GB9909362D0 (en) Memory database system for encrypted progarmme material
EP1223496A3 (en) Encryption scheme for limiting the maximum number of accesses to a digital file of predetermined content
CN101282212A (en) System and method for encipherment and decipherment based on template
WO2002041101A3 (en) Method and system for transmitting data with enhanced security that conforms to a network protocol
WO1999010859A3 (en) Steganographic encryption system for secure data
JP5073307B2 (en) Cryptographic data communication system
CA2432445A1 (en) Method for storing encrypted data
KR960705270A (en) SECURITY SYSTEM FOR SOFTWARE
CN113095993A (en) Image verification method and system for chaotic encryption and digital watermarking

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP